What is used by CHAP to verify the identity of a host?

A. A three way handshake and private keys
B. host certificates
C. network MAC address database
D. Pre-approved host list


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) _________ field is a field in which values are obtained from another table or from a list

Fill in the blank(s) with correct word

Computer Science & Information Technology

A pattern match selects records whose values for the designated field matches one of two or more simple condition values.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Compared to mainframe architecture, distributed systems decrease concerns about data security and integrity because fewer individual clients require access to perform processing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following would cause a run-time error?

What will be an ideal response?

Computer Science & Information Technology